Research Article
A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code
Table 2
Settings of the proposed network.
| Layer name | Activation func. | Node num. |
| BLSTM | None | 600 | Dense 1 | “LeakyReLU” | 300 | Dense 2 | “LeakyReLU” | 300 | Softmax | “Softmax” | 2 |
|
|